summaryrefslogtreecommitdiff
path: root/changes
AgeCommit message (Collapse)Author
2019-10-17Handle errors from execve() in the Unix process backend more gracefully.Alexander Færøy
This patch removes a call to tor_assert_unreached() after execve() failed. This assertion leads to the child process emitting a stack trace on its standard output, which makes the error harder for the user to demystify, since they think it is an internal error in Tor instead of "just" being a "no such file or directory" error. The process will now instead output "Error from child process: X" where X is the stringified version of the errno value. See: https://bugs.torproject.org/31810
2019-10-17Merge remote-tracking branch 'tor-github/pr/1373' into maint-0.4.2teor
2019-10-11Merge branch 'ticket31682_042_01_squashed'Nick Mathewson
2019-10-11hs-v3: Fix implicit ssize_t to size_t conversionDavid Goulet
Found by Coverity. Fixes #31682 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-10-09Merge remote-tracking branch 'tor-github/pr/1394'Nick Mathewson
2019-10-09Merge remote-tracking branch 'tor-github/pr/1399'Nick Mathewson
2019-10-09Merge remote-tracking branch 'tor-github/pr/1401'Nick Mathewson
2019-10-09Merge branch 'bug30344_squashed_035'Nick Mathewson
2019-10-09Stop libevent from reading data from closed connections.George Kadianakis
Code adapted from Rob's proposed patch in #30344. Also add a comment in connection_mark_for_close_internal_() on why we should not be adding extra code there without a very good reason.
2019-10-08hs-v3: Do not remove intro point if circuit existsDavid Goulet
When considering introduction point of a service's descriptor, do not remove an intro point that has an established or pending circuit. Fixes #31652 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-10-08Merge branch 'tor-github/pr/1381'David Goulet
2019-10-08Fix flapping of test_service_intro_point() unittest.George Kadianakis
2019-10-07Merge remote-tracking branch 'tor-github/pr/1317'Nick Mathewson
2019-10-07Merge branch 'ticket31548_035_01_squashed'Nick Mathewson
2019-10-07hs-v3: Make service pick the exact amount of intro pointsDavid Goulet
When encoding introduction points, we were not checking if that intro points had an established circuit. When botting up, the service will pick, by default, 3 + 2 intro points and the first 3 that establish, we use them and upload the descriptor. However, the intro point is removed from the service descriptor list only when the circuit has opened and we see that we have already enough intro points, it is then removed. But it is possible that the service establishes 3 intro points successfully before the other(s) have even opened yet. This lead to the service encoding extra intro points in the descriptor even though the circuit is not opened or might never establish (#31561). Fixes #31548 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-10-07Merge remote-tracking branch 'tor-github/pr/1379'Nick Mathewson
2019-10-07Merge remote-tracking branch 'tor-github/pr/1390'Nick Mathewson
2019-10-04tls: Log TLS read buffer length bugs onceteor
Rather than filling the logs with similar warnings. Fixes bug 31939; bugfix on 0.3.0.4-rc.
2019-10-03hs: ADD_ONION NEW:BEST now defaults to ED25519-V3David Goulet
From RSA1024 (v2) to v3 now. Closes #29669 Signed-off-by: David Goulet <dgoulet@torproject.org>
2019-10-03Sort changes entries into a changelog for 0.4.2.2-alphaNick Mathewson
2019-10-03Merge branch 'tor-github/pr/1377'George Kadianakis
2019-10-03Merge branch 'tor-github/pr/1276'George Kadianakis
2019-10-03Authorities reject relays running unsupported Tor release series.Nick Mathewson
Our minimum version is now 0.2.9.5-alpha. Series 0.3.0, 0.3.1, 0.3.2, 0.3.3, and 0.3.4 are now rejected. Also, extract this version-checking code into a new function, so we can test it. Closes ticket 31549. Also reject 0.3.5.0 through 0.3.5.6-rc as unstable.
2019-10-03Merge remote-tracking branch 'tor-github/pr/1376'Nick Mathewson
2019-10-03Merge remote-tracking branch 'tor-github/pr/1358'Nick Mathewson
2019-10-03Merge remote-tracking branch 'tor-github/pr/1382'Nick Mathewson
2019-10-03configure: Give a more useful message when pkg-config failsteor
When pkg-config is not installed, or a library that depends on pkg-config is not found, tell the user what to do to fix the problem. Fixes bug 31922; bugfix on 0.3.1.1-alpha.
2019-10-03control/control: Refactor some error handling codeteor
Split some protocol error handling out of connection_control_process_inbuf(). This refactor reduces the size of a practracker exception. Closes 31840.
2019-10-02Merge remote-tracking branch 'tor-github/pr/1374'Nick Mathewson
2019-10-02Merge branch 'tor-github/pr/1385'David Goulet
2019-10-02Merge branch 'tor-github/pr/1344'David Goulet
2019-10-02Merge branch 'tor-github/pr/1363'David Goulet
2019-10-02Merge branch 'maint-0.4.1'Nick Mathewson
2019-10-02Merge branch 'maint-0.4.0' into maint-0.4.1Nick Mathewson
2019-10-02Merge branch 'maint-0.3.5' into maint-0.4.0Nick Mathewson
2019-10-02Merge branch 'maint-0.2.9' into maint-0.3.5Nick Mathewson
2019-10-02Update geoip and geoip6 to the October 1 2019 database.Karsten Loesing
2019-10-01Fix a crash bug in max_u16_in_sl()Nick Mathewson
The documentation for this function says that the smartlist can contain NULLs, but the code only handled NULLs if they were at the start of the list. We didn't notice this for a long time, because when Tor is run normally, the sequence of msg_id_t is densely packed, and so this list (mapping msg_id_t to channel_id_t) contains no NULL elements. We could only run into this bug: * when Tor was running in embedded mode, and starting more than once. * when Tor ran first with more pubsub messages enabled, and then later with fewer. * When the second run (the one with fewer enabled pubsub messages) had at least some messages enabled, and those messages were not the ones with numerically highest msg_id_t values. Fixes bug 31898; bugfix on 47de9c7b0a828de7fb8129413db70bc4e4ecac6d in 0.4.1.1-alpha.
2019-10-02Merge branch 'bug31859_041' into bug31859_masterteor
Merge master's RUST_VERSION="nightly" into the macOS Rust job from bug31859_041. Drop master's RUST_VERSION="beta", because we only have two Rust jobs now.
2019-10-01Merge branch 'bug31859_040' into bug31859_041teor
Merge TOR_TEST_RNG_SEED in maint-0.4.1 into the coverage line from bug31859_040.
2019-10-01Merge branch 'bug31859_035' into bug31859_040teor
2019-10-01Help users who try to use v2 client auth in v3 onions.George Kadianakis
2019-10-01Merge branch 'bug31859_029' into bug31859_035teor
While merging: * leave out some redundant jobs and build matrix entries
2019-09-30Fix the documentation for GuardLifetime.Nick Mathewson
2019-09-30Travis: Add a macOS chutney job, but don't wait for it to finishteor
Since Travis macOS has IPv6 support (and Travis Linux does not), chutney will now run its IPv6 networks as part of Travis CI. But since chutney is slow, don't wait for the macOS chutney to finish. (Travis have fixed the duplicate notification bug in fast_finish. So we can use fast_finish and allow_failure to finish early. Unfortunately, allow_failure also means we ignore failures in macOS chutney.) Also make sure that we have: * a compile on each platform, with each compiler, * a check on each platform, and * a check on each compiler. Finally, sort builds: allow fail last, macOS first, slowest first. Closes ticket 30860. Closes ticket 31859 for 0.2.9.
2019-09-30Travis: Remove a redundant clang Linux jobteor
Part of 31859.
2019-09-30err: Always lock the backtrace buffer before it is usedteor
Fixes bug 31734; bugfix on 0.2.5.3-alpha.
2019-09-30log: When initialising log domain masks, only set known log domainsteor
And add a runtime test that checks for unknown domains and flags. Fixes bug 31854; bugfix on 0.2.1.1-alpha.
2019-09-30Merge branch 'tor-github/pr/1366'George Kadianakis
2019-09-30Merge branch 'tor-github/pr/1346'George Kadianakis